Flipper Zero device can crash iPhones, hack key Cards

Share post:

A new device called the Flipper Zero has been gaining popularity for its ability to hack a wide range of radio frequency (RF) devices, including iPhones, key cards, and even car fobs. The device is relatively inexpensive and easy to use, making it accessible to a wide range of people, including those with limited technical expertise.

Security researcher Jeroen van der Ham was the first to report that the Flipper Zero could be used to crash iPhones running iOS 17. He was able to replicate the attack in a controlled environment, and other researchers have since confirmed that it is real.

The attack works by sending a constant stream of Bluetooth pairing requests to the iPhone. This can eventually overwhelm the phone’s Bluetooth stack, causing it to crash.

In addition to crashing iPhones, the Flipper Zero can also be used to hack key cards and other RF devices. This is done by sending spoofed signals that can trick the devices into thinking that they are being activated by a legitimate device.

For example, the Flipper Zero can be used to clone hotel key cards, open garage doors, and even start cars.

The sources for this piece include an article in ArsTechnica.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways